Secrecy Codes for State Estimation of General Linear Systems

IF 7 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automatic Control Pub Date : 2024-09-18 DOI:10.1109/TAC.2024.3463728
Damián Marelli;Tianju Sui;Minyue Fu;Qianqian Cai
{"title":"Secrecy Codes for State Estimation of General Linear Systems","authors":"Damián Marelli;Tianju Sui;Minyue Fu;Qianqian Cai","doi":"10.1109/TAC.2024.3463728","DOIUrl":null,"url":null,"abstract":"A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing this information exchange. Secrecy coding schemes have been recently proposed to achieve immunity to eavesdropping. The essential idea consists in coding the transmitting information in a way such that a single packet lost by the eavesdropper causes an irrecoverable error of its state estimation. Common limitations of the available methods are the assumptions that the local system can directly measure its internal state and that the system is unstable. In this work, we drop these assumptions and consider the general case in which measurements are noisy linear combinations of an inaccessible internal state and that the system is not necessarily unstable. To design the coding scheme, we introduce the concept of <italic>total secrecy</i>, meaning that if the eavesdropper misses a packet that is available at the remote estimator, the former behaves as if no further packets were received. We derive a sufficient condition for total secrecy, as well as the code achieving this property. Also, for the case in which we cannot guarantee total secrecy, we address the problem of designing a code achieving maximum secrecy in some sense. We present numerical examples illustrating our claims.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 2","pages":"1161-1168"},"PeriodicalIF":7.0000,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10684094/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing this information exchange. Secrecy coding schemes have been recently proposed to achieve immunity to eavesdropping. The essential idea consists in coding the transmitting information in a way such that a single packet lost by the eavesdropper causes an irrecoverable error of its state estimation. Common limitations of the available methods are the assumptions that the local system can directly measure its internal state and that the system is unstable. In this work, we drop these assumptions and consider the general case in which measurements are noisy linear combinations of an inaccessible internal state and that the system is not necessarily unstable. To design the coding scheme, we introduce the concept of total secrecy, meaning that if the eavesdropper misses a packet that is available at the remote estimator, the former behaves as if no further packets were received. We derive a sufficient condition for total secrecy, as well as the code achieving this property. Also, for the case in which we cannot guarantee total secrecy, we address the problem of designing a code achieving maximum secrecy in some sense. We present numerical examples illustrating our claims.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通用线性系统状态估计的保密代码
典型的网络物理系统设置包括本地系统将其内部状态的测量发送到远程状态估计器。一种攻击由窃听者观察到这种信息交换组成。为了防止窃听,最近提出了保密编码方案。其基本思想在于对传输信息进行编码,使窃听者丢失的单个数据包导致其状态估计出现不可恢复的错误。可用方法的常见限制是假设局部系统可以直接测量其内部状态,并且系统是不稳定的。在这项工作中,我们放弃这些假设并考虑一般情况,其中测量是不可访问的内部状态的噪声线性组合,并且系统不一定不稳定。为了设计编码方案,我们引入了完全保密的概念,这意味着如果窃听者错过了远程估计器可用的数据包,窃听者的行为就像没有收到进一步的数据包一样。我们得到了完全保密的充分条件,以及实现这一性质的代码。同样,对于我们不能保证完全保密的情况,我们解决了在某种意义上实现最大保密的代码设计问题。我们用数值例子来说明我们的主张。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automatic Control
IEEE Transactions on Automatic Control 工程技术-工程:电子与电气
CiteScore
11.30
自引率
5.90%
发文量
824
审稿时长
9 months
期刊介绍: In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered: 1) Papers: Presentation of significant research, development, or application of control concepts. 2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions. In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.
期刊最新文献
Differentially private consensus of multi-agent systems under binary-valued communications The Internal Model Principle of Time-Varying Optimization Leader-following Consensus over Jointly Connected Switching Networks is Achievable for Exponentially Unstable Linear Systems Data-Driven Control of T-Product-Based Dynamical Systems Optimal Policy Design for Repeated Decision-Making under Social Influence
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1